Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 19:29
Static task
static1
Behavioral task
behavioral1
Sample
091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8.exe
Resource
win7-20240903-en
General
-
Target
091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8.exe
-
Size
91KB
-
MD5
6af719a5edf29e38892683f1a4bd57f0
-
SHA1
43088ca57e32503dedc3819c04ccea38ae096628
-
SHA256
091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8
-
SHA512
fa8175bd8d1e8ff76879daee88c59f5ab1fe962f31d4c729e4a7e66eda997e8993f731dd2ac28c6c9daf6d43606fd96bae6a3e2a11499c37b2f3a46368577a18
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+C2iJvRirE0DmmdL2jqWkBc:ymb3NkkiQ3mdBjF+3TU2iBRioSumWS1a
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/276-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1692-16-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2308-32-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2308-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2652-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2008-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2808-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2608-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2600-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1464-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2368-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2864-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/716-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2220-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2656-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1512-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1716-215-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2180-241-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2356-259-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2964-250-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
pdvpd.exebbhbbh.exe042200.exexrffrrx.exedvjpp.exe4828006.exexlllrlx.exejpvpp.exexflffxr.exeo488484.exe04668.exefxlrxfr.exe00666.exe48024.exe88640.exe260646.exebbthtt.exe4828446.exe8822442.exei200622.exe8060466.exerxrflrr.exennbbbh.exe0868440.exeddvdp.exe82062.exee26884.exefxlrxfr.exefxrlxfr.exe9dvjp.exe006424.exe6468248.exe22008.exei868602.exe22068.exe8688002.exe64848.exebhbntb.exe0428446.exehbtnbn.exe48682.exe8800660.exe7nbntn.exedvppd.exerrfflrf.exe7jjpd.exentbtnn.exe640062.exe6086846.exe84204.exe5nntbt.exennhtbh.exe64246.exe864062.exepjdpp.exedvjdv.exehnthhh.exepjvjp.exek42288.exetbnhtt.exexlllxxl.exevvpdv.exe8640622.exew80640.exepid process 1692 pdvpd.exe 2308 bbhbbh.exe 2652 042200.exe 2112 xrffrrx.exe 2008 dvjpp.exe 2808 4828006.exe 2608 xlllrlx.exe 2600 jpvpp.exe 1464 xflffxr.exe 2368 o488484.exe 2864 04668.exe 716 fxlrxfr.exe 2612 00666.exe 1048 48024.exe 1636 88640.exe 280 260646.exe 2252 bbthtt.exe 2220 4828446.exe 2656 8822442.exe 1512 i200622.exe 1716 8060466.exe 2508 rxrflrr.exe 2000 nnbbbh.exe 2180 0868440.exe 2964 ddvdp.exe 2356 82062.exe 2344 e26884.exe 1640 fxlrxfr.exe 2360 fxrlxfr.exe 276 9dvjp.exe 2016 006424.exe 2852 6468248.exe 2264 22008.exe 2792 i868602.exe 2780 22068.exe 2696 8688002.exe 2276 64848.exe 2800 bhbntb.exe 2888 0428446.exe 2596 hbtnbn.exe 1236 48682.exe 2600 8800660.exe 1224 7nbntn.exe 1984 dvppd.exe 2864 rrfflrf.exe 1564 7jjpd.exe 1720 ntbtnn.exe 2744 640062.exe 1048 6086846.exe 1932 84204.exe 3016 5nntbt.exe 3012 nnhtbh.exe 2236 64246.exe 2220 864062.exe 572 pjdpp.exe 1736 dvjdv.exe 768 hnthhh.exe 2668 pjvjp.exe 1940 k42288.exe 2000 tbnhtt.exe 1392 xlllxxl.exe 2244 vvpdv.exe 2944 8640622.exe 2344 w80640.exe -
Processes:
resource yara_rule behavioral1/memory/276-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/276-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1692-16-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1692-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1692-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2308-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2652-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2652-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2652-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2652-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2112-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2112-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2008-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2808-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2608-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2600-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1464-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2368-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/716-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2220-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2656-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1512-206-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1716-215-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2180-241-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2356-259-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2964-250-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
u220064.exea4284.exeu084684.exe48466.exehbbnbh.exejpdvd.exe668408.exe666808.exe260204.exefrflrrf.exe6044462.exee00448.exe202844.exem2806.exetnbbhn.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u220064.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4284.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u084684.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48466.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbnbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpdvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 668408.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 666808.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 260204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frflrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6044462.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e00448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202844.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m2806.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8.exepdvpd.exebbhbbh.exe042200.exexrffrrx.exedvjpp.exe4828006.exexlllrlx.exejpvpp.exexflffxr.exeo488484.exe04668.exefxlrxfr.exe00666.exe48024.exe88640.exedescription pid process target process PID 276 wrote to memory of 1692 276 091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8.exe pdvpd.exe PID 276 wrote to memory of 1692 276 091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8.exe pdvpd.exe PID 276 wrote to memory of 1692 276 091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8.exe pdvpd.exe PID 276 wrote to memory of 1692 276 091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8.exe pdvpd.exe PID 1692 wrote to memory of 2308 1692 pdvpd.exe bbhbbh.exe PID 1692 wrote to memory of 2308 1692 pdvpd.exe bbhbbh.exe PID 1692 wrote to memory of 2308 1692 pdvpd.exe bbhbbh.exe PID 1692 wrote to memory of 2308 1692 pdvpd.exe bbhbbh.exe PID 2308 wrote to memory of 2652 2308 bbhbbh.exe 042200.exe PID 2308 wrote to memory of 2652 2308 bbhbbh.exe 042200.exe PID 2308 wrote to memory of 2652 2308 bbhbbh.exe 042200.exe PID 2308 wrote to memory of 2652 2308 bbhbbh.exe 042200.exe PID 2652 wrote to memory of 2112 2652 042200.exe xrffrrx.exe PID 2652 wrote to memory of 2112 2652 042200.exe xrffrrx.exe PID 2652 wrote to memory of 2112 2652 042200.exe xrffrrx.exe PID 2652 wrote to memory of 2112 2652 042200.exe xrffrrx.exe PID 2112 wrote to memory of 2008 2112 xrffrrx.exe dvjpp.exe PID 2112 wrote to memory of 2008 2112 xrffrrx.exe dvjpp.exe PID 2112 wrote to memory of 2008 2112 xrffrrx.exe dvjpp.exe PID 2112 wrote to memory of 2008 2112 xrffrrx.exe dvjpp.exe PID 2008 wrote to memory of 2808 2008 dvjpp.exe 4828006.exe PID 2008 wrote to memory of 2808 2008 dvjpp.exe 4828006.exe PID 2008 wrote to memory of 2808 2008 dvjpp.exe 4828006.exe PID 2008 wrote to memory of 2808 2008 dvjpp.exe 4828006.exe PID 2808 wrote to memory of 2608 2808 4828006.exe xlllrlx.exe PID 2808 wrote to memory of 2608 2808 4828006.exe xlllrlx.exe PID 2808 wrote to memory of 2608 2808 4828006.exe xlllrlx.exe PID 2808 wrote to memory of 2608 2808 4828006.exe xlllrlx.exe PID 2608 wrote to memory of 2600 2608 xlllrlx.exe jpvpp.exe PID 2608 wrote to memory of 2600 2608 xlllrlx.exe jpvpp.exe PID 2608 wrote to memory of 2600 2608 xlllrlx.exe jpvpp.exe PID 2608 wrote to memory of 2600 2608 xlllrlx.exe jpvpp.exe PID 2600 wrote to memory of 1464 2600 jpvpp.exe xflffxr.exe PID 2600 wrote to memory of 1464 2600 jpvpp.exe xflffxr.exe PID 2600 wrote to memory of 1464 2600 jpvpp.exe xflffxr.exe PID 2600 wrote to memory of 1464 2600 jpvpp.exe xflffxr.exe PID 1464 wrote to memory of 2368 1464 xflffxr.exe o488484.exe PID 1464 wrote to memory of 2368 1464 xflffxr.exe o488484.exe PID 1464 wrote to memory of 2368 1464 xflffxr.exe o488484.exe PID 1464 wrote to memory of 2368 1464 xflffxr.exe o488484.exe PID 2368 wrote to memory of 2864 2368 o488484.exe 04668.exe PID 2368 wrote to memory of 2864 2368 o488484.exe 04668.exe PID 2368 wrote to memory of 2864 2368 o488484.exe 04668.exe PID 2368 wrote to memory of 2864 2368 o488484.exe 04668.exe PID 2864 wrote to memory of 716 2864 04668.exe fxlrxfr.exe PID 2864 wrote to memory of 716 2864 04668.exe fxlrxfr.exe PID 2864 wrote to memory of 716 2864 04668.exe fxlrxfr.exe PID 2864 wrote to memory of 716 2864 04668.exe fxlrxfr.exe PID 716 wrote to memory of 2612 716 fxlrxfr.exe 00666.exe PID 716 wrote to memory of 2612 716 fxlrxfr.exe 00666.exe PID 716 wrote to memory of 2612 716 fxlrxfr.exe 00666.exe PID 716 wrote to memory of 2612 716 fxlrxfr.exe 00666.exe PID 2612 wrote to memory of 1048 2612 00666.exe 48024.exe PID 2612 wrote to memory of 1048 2612 00666.exe 48024.exe PID 2612 wrote to memory of 1048 2612 00666.exe 48024.exe PID 2612 wrote to memory of 1048 2612 00666.exe 48024.exe PID 1048 wrote to memory of 1636 1048 48024.exe 88640.exe PID 1048 wrote to memory of 1636 1048 48024.exe 88640.exe PID 1048 wrote to memory of 1636 1048 48024.exe 88640.exe PID 1048 wrote to memory of 1636 1048 48024.exe 88640.exe PID 1636 wrote to memory of 280 1636 88640.exe 260646.exe PID 1636 wrote to memory of 280 1636 88640.exe 260646.exe PID 1636 wrote to memory of 280 1636 88640.exe 260646.exe PID 1636 wrote to memory of 280 1636 88640.exe 260646.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8.exe"C:\Users\Admin\AppData\Local\Temp\091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:276 -
\??\c:\pdvpd.exec:\pdvpd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1692 -
\??\c:\bbhbbh.exec:\bbhbbh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
\??\c:\042200.exec:\042200.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2652 -
\??\c:\xrffrrx.exec:\xrffrrx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2112 -
\??\c:\dvjpp.exec:\dvjpp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2008 -
\??\c:\4828006.exec:\4828006.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\xlllrlx.exec:\xlllrlx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
\??\c:\jpvpp.exec:\jpvpp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
\??\c:\xflffxr.exec:\xflffxr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1464 -
\??\c:\o488484.exec:\o488484.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
\??\c:\04668.exec:\04668.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\fxlrxfr.exec:\fxlrxfr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:716 -
\??\c:\00666.exec:\00666.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
\??\c:\48024.exec:\48024.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1048 -
\??\c:\88640.exec:\88640.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
\??\c:\260646.exec:\260646.exe17⤵
- Executes dropped EXE
PID:280 -
\??\c:\bbthtt.exec:\bbthtt.exe18⤵
- Executes dropped EXE
PID:2252 -
\??\c:\4828446.exec:\4828446.exe19⤵
- Executes dropped EXE
PID:2220 -
\??\c:\8822442.exec:\8822442.exe20⤵
- Executes dropped EXE
PID:2656 -
\??\c:\i200622.exec:\i200622.exe21⤵
- Executes dropped EXE
PID:1512 -
\??\c:\8060466.exec:\8060466.exe22⤵
- Executes dropped EXE
PID:1716 -
\??\c:\rxrflrr.exec:\rxrflrr.exe23⤵
- Executes dropped EXE
PID:2508 -
\??\c:\nnbbbh.exec:\nnbbbh.exe24⤵
- Executes dropped EXE
PID:2000 -
\??\c:\0868440.exec:\0868440.exe25⤵
- Executes dropped EXE
PID:2180 -
\??\c:\ddvdp.exec:\ddvdp.exe26⤵
- Executes dropped EXE
PID:2964 -
\??\c:\82062.exec:\82062.exe27⤵
- Executes dropped EXE
PID:2356 -
\??\c:\e26884.exec:\e26884.exe28⤵
- Executes dropped EXE
PID:2344 -
\??\c:\fxlrxfr.exec:\fxlrxfr.exe29⤵
- Executes dropped EXE
PID:1640 -
\??\c:\fxrlxfr.exec:\fxrlxfr.exe30⤵
- Executes dropped EXE
PID:2360 -
\??\c:\9dvjp.exec:\9dvjp.exe31⤵
- Executes dropped EXE
PID:276 -
\??\c:\006424.exec:\006424.exe32⤵
- Executes dropped EXE
PID:2016 -
\??\c:\6468248.exec:\6468248.exe33⤵
- Executes dropped EXE
PID:2852 -
\??\c:\22008.exec:\22008.exe34⤵
- Executes dropped EXE
PID:2264 -
\??\c:\i868602.exec:\i868602.exe35⤵
- Executes dropped EXE
PID:2792 -
\??\c:\22068.exec:\22068.exe36⤵
- Executes dropped EXE
PID:2780 -
\??\c:\8688002.exec:\8688002.exe37⤵
- Executes dropped EXE
PID:2696 -
\??\c:\64848.exec:\64848.exe38⤵
- Executes dropped EXE
PID:2276 -
\??\c:\bhbntb.exec:\bhbntb.exe39⤵
- Executes dropped EXE
PID:2800 -
\??\c:\0428446.exec:\0428446.exe40⤵
- Executes dropped EXE
PID:2888 -
\??\c:\hbtnbn.exec:\hbtnbn.exe41⤵
- Executes dropped EXE
PID:2596 -
\??\c:\48682.exec:\48682.exe42⤵
- Executes dropped EXE
PID:1236 -
\??\c:\8800660.exec:\8800660.exe43⤵
- Executes dropped EXE
PID:2600 -
\??\c:\7nbntn.exec:\7nbntn.exe44⤵
- Executes dropped EXE
PID:1224 -
\??\c:\dvppd.exec:\dvppd.exe45⤵
- Executes dropped EXE
PID:1984 -
\??\c:\rrfflrf.exec:\rrfflrf.exe46⤵
- Executes dropped EXE
PID:2864 -
\??\c:\7jjpd.exec:\7jjpd.exe47⤵
- Executes dropped EXE
PID:1564 -
\??\c:\ntbtnn.exec:\ntbtnn.exe48⤵
- Executes dropped EXE
PID:1720 -
\??\c:\640062.exec:\640062.exe49⤵
- Executes dropped EXE
PID:2744 -
\??\c:\6086846.exec:\6086846.exe50⤵
- Executes dropped EXE
PID:1048 -
\??\c:\84204.exec:\84204.exe51⤵
- Executes dropped EXE
PID:1932 -
\??\c:\5nntbt.exec:\5nntbt.exe52⤵
- Executes dropped EXE
PID:3016 -
\??\c:\nnhtbh.exec:\nnhtbh.exe53⤵
- Executes dropped EXE
PID:3012 -
\??\c:\64246.exec:\64246.exe54⤵
- Executes dropped EXE
PID:2236 -
\??\c:\864062.exec:\864062.exe55⤵
- Executes dropped EXE
PID:2220 -
\??\c:\pjdpp.exec:\pjdpp.exe56⤵
- Executes dropped EXE
PID:572 -
\??\c:\dvjdv.exec:\dvjdv.exe57⤵
- Executes dropped EXE
PID:1736 -
\??\c:\hnthhh.exec:\hnthhh.exe58⤵
- Executes dropped EXE
PID:768 -
\??\c:\pjvjp.exec:\pjvjp.exe59⤵
- Executes dropped EXE
PID:2668 -
\??\c:\k42288.exec:\k42288.exe60⤵
- Executes dropped EXE
PID:1940 -
\??\c:\tbnhtt.exec:\tbnhtt.exe61⤵
- Executes dropped EXE
PID:2000 -
\??\c:\xlllxxl.exec:\xlllxxl.exe62⤵
- Executes dropped EXE
PID:1392 -
\??\c:\vvpdv.exec:\vvpdv.exe63⤵
- Executes dropped EXE
PID:2244 -
\??\c:\8640622.exec:\8640622.exe64⤵
- Executes dropped EXE
PID:2944 -
\??\c:\w80640.exec:\w80640.exe65⤵
- Executes dropped EXE
PID:2344 -
\??\c:\lffllxx.exec:\lffllxx.exe66⤵PID:908
-
\??\c:\260204.exec:\260204.exe67⤵
- System Location Discovery: System Language Discovery
PID:2460 -
\??\c:\o824802.exec:\o824802.exe68⤵PID:1668
-
\??\c:\dvppd.exec:\dvppd.exe69⤵PID:2080
-
\??\c:\3pvvp.exec:\3pvvp.exe70⤵PID:2352
-
\??\c:\hhtbnt.exec:\hhtbnt.exe71⤵PID:1692
-
\??\c:\vpdjv.exec:\vpdjv.exe72⤵PID:1688
-
\??\c:\7ddjd.exec:\7ddjd.exe73⤵PID:2264
-
\??\c:\e82840.exec:\e82840.exe74⤵PID:1800
-
\??\c:\1nntnb.exec:\1nntnb.exe75⤵PID:2840
-
\??\c:\2882600.exec:\2882600.exe76⤵PID:2832
-
\??\c:\hthnnt.exec:\hthnnt.exe77⤵PID:2008
-
\??\c:\jjdpp.exec:\jjdpp.exe78⤵PID:2736
-
\??\c:\64240.exec:\64240.exe79⤵PID:2808
-
\??\c:\64824.exec:\64824.exe80⤵PID:3040
-
\??\c:\7fxlrrl.exec:\7fxlrrl.exe81⤵PID:3032
-
\??\c:\1pvvd.exec:\1pvvd.exe82⤵PID:400
-
\??\c:\4862446.exec:\4862446.exe83⤵PID:1224
-
\??\c:\60402.exec:\60402.exe84⤵PID:2368
-
\??\c:\w06840.exec:\w06840.exe85⤵PID:1284
-
\??\c:\42002.exec:\42002.exe86⤵PID:2612
-
\??\c:\fxflxxf.exec:\fxflxxf.exe87⤵PID:2628
-
\??\c:\5jddj.exec:\5jddj.exe88⤵PID:1152
-
\??\c:\k86280.exec:\k86280.exe89⤵PID:548
-
\??\c:\rflfllx.exec:\rflfllx.exe90⤵PID:3020
-
\??\c:\tnhbnh.exec:\tnhbnh.exe91⤵PID:2320
-
\??\c:\pjvpv.exec:\pjvpv.exe92⤵PID:3012
-
\??\c:\6646026.exec:\6646026.exe93⤵PID:2144
-
\??\c:\lfxrxfr.exec:\lfxrxfr.exe94⤵PID:2376
-
\??\c:\86668.exec:\86668.exe95⤵PID:1104
-
\??\c:\ttnhnh.exec:\ttnhnh.exe96⤵PID:2044
-
\??\c:\26068.exec:\26068.exe97⤵PID:3024
-
\??\c:\486288.exec:\486288.exe98⤵PID:1708
-
\??\c:\62200.exec:\62200.exe99⤵PID:1972
-
\??\c:\fxrxlrf.exec:\fxrxlrf.exe100⤵PID:1316
-
\??\c:\482486.exec:\482486.exe101⤵PID:1392
-
\??\c:\040606.exec:\040606.exe102⤵PID:348
-
\??\c:\jpvpp.exec:\jpvpp.exe103⤵PID:2208
-
\??\c:\q64020.exec:\q64020.exe104⤵PID:1628
-
\??\c:\82240.exec:\82240.exe105⤵PID:2348
-
\??\c:\9nhbhh.exec:\9nhbhh.exe106⤵PID:2448
-
\??\c:\9ppvd.exec:\9ppvd.exe107⤵PID:2076
-
\??\c:\04642.exec:\04642.exe108⤵PID:2292
-
\??\c:\xxrrxfl.exec:\xxrrxfl.exe109⤵PID:2308
-
\??\c:\7xlrxfl.exec:\7xlrxfl.exe110⤵PID:2704
-
\??\c:\9fxflrf.exec:\9fxflrf.exe111⤵PID:1588
-
\??\c:\bbthth.exec:\bbthth.exe112⤵PID:2792
-
\??\c:\2626606.exec:\2626606.exe113⤵PID:2716
-
\??\c:\ttntbn.exec:\ttntbn.exe114⤵PID:2696
-
\??\c:\lfrlxxl.exec:\lfrlxxl.exe115⤵PID:2832
-
\??\c:\nhtbhn.exec:\nhtbhn.exe116⤵PID:2800
-
\??\c:\rfxrxfr.exec:\rfxrxfr.exe117⤵PID:2568
-
\??\c:\222446.exec:\222446.exe118⤵PID:2596
-
\??\c:\64246.exec:\64246.exe119⤵PID:1460
-
\??\c:\nhtbhh.exec:\nhtbhh.exe120⤵PID:1236
-
\??\c:\w68862.exec:\w68862.exe121⤵PID:3044
-
\??\c:\o480280.exec:\o480280.exe122⤵PID:2872
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-